Issue No.02 - March/April (2012 vol.10)
Gernot Heiser , NICTA
Toby Murray , NICTA
Gerwin Klein , NICTA
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.41
The time has arrived for truly trustworthy systems, backed by machine-checked proofs of security and reliability. Research demonstrates that formal whole-system analysis that applies to the C and binary implementation level is feasible, including proofs of integrity, authority confinement, confidentiality, and worst-case execution time. Because these proofs build on previous results, they become easier each year. However, they do have some limitations.
trustworthy systems, verification and analysis, seL4 microkernel, integrity, confidentiality, worst-case execution time, safety, security, computer security, functional correctness, authority confinement, noninterference
Gernot Heiser, Toby Murray, Gerwin Klein, "It's Time for Trustworthy Systems", IEEE Security & Privacy, vol.10, no. 2, pp. 67-70, March/April 2012, doi:10.1109/MSP.2012.41